Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    how to get IP Attacker into the blocklist

    Scheduled Pinned Locked Moved IDS/IPS
    50 Posts 9 Posters 8.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • E
      ezvink @bmeeks
      last edited by

      @bmeeks
      I've added a rule with DROP sir to the rules I created in the custom rule, but it's still not in the blockhost tab

      1 Reply Last reply Reply Quote 0
      • E
        ezvink @SteveITS
        last edited by

        @steveits
        if my attacker's IP has entered the suppress tab, is the IP blocked, sir?

        bmeeksB S 2 Replies Last reply Reply Quote 0
        • bmeeksB
          bmeeks @ezvink
          last edited by

          @ezvink said in how to get IP Attacker into the blocklist:

          @steveits
          if my attacker's IP has entered the suppress tab, is the IP blocked, sir?

          No. A suppress list suppresses the alert and therefore any associated block.

          1 Reply Last reply Reply Quote 0
          • S
            SteveITS Galactic Empire @ezvink
            last edited by

            @ezvink said in how to get IP Attacker into the blocklist:

            if my attacker's IP has entered the suppress tab, is the IP blocked

            No.

            The suppress list is for alerts that you never want to see again. Meaning, the alert is suppressed. Therefore, never blocked.

            If you want to block an attacking IP you don't enter it anywhere. You said you were using Legacy with blocking enabled, so if the attacker triggers an Alert then the IP appears on the Blocks tab.

            It sounds like you have created a custom rule. Is the rule being triggered? It is logged on the Alert tab?

            Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
            When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
            Upvote 👍 helpful posts!

            E 1 Reply Last reply Reply Quote 0
            • E
              ezvink @SteveITS
              last edited by

              @steveits
              I do not set anything else sir, I just leave the default.

              but it doesn't work on the suricata/snort I installed sir, can you help me find the point where the problem is?

              E johnpozJ 2 Replies Last reply Reply Quote 0
              • E
                ezvink @ezvink
                last edited by

                @ezvink
                This is the rule that I added sir, it can be detected and goes to alerts but doesn't go to the blockhost tab
                dfb4f1d0-cfe3-4151-b722-09b81de06e3d-image.png
                f6d6bd19-aea4-4d9c-9c35-4671a53336a7-image.png

                1 Reply Last reply Reply Quote 0
                • E
                  ezvink
                  last edited by

                  after I checked the "block Drop on only" menu, the action symbol changed to DROP before it was still alert even though the rule I added had dropped, and even then the blockhost menu pack remains empty
                  3314033b-f03f-46de-9e18-282410edd072-image.png

                  1 Reply Last reply Reply Quote 0
                  • E
                    ezvink
                    last edited by

                    b5ac4dec-98d3-450c-8710-4c61d7a67c62-image.png
                    I have followed from this forum too, but still the blockhost tab is empty

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator @ezvink
                      last edited by johnpoz

                      @ezvink said in how to get IP Attacker into the blocklist:

                      but it doesn't work on the suricata/snort I installed sir

                      Which is it - you don't have both running do you?

                      You removed the entry from the passlist?

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      E 1 Reply Last reply Reply Quote 0
                      • bmeeksB
                        bmeeks
                        last edited by bmeeks

                        I'm pretty sure your rule is not going to result in a block because of the default Pass List settings when using Legacy Blocking Mode. You have the rule running on the OPT1 interface. That is a locally-attached interface, so all IP addresses on that interface subnet are automatically added to the default Pass List. If the 192.168.3.5 address is also part of a locally-attached network, then it will also be part of the default Pass List. IP addresses covered by a Pass List entry will generate alerts, but will not result in actual blocks.

                        Post a copy of the current Pass List setting by going to the INTERFACE EDIT tab for the OPT1 interface, scroll down to the Pass List drop-down, then click the View List button out on the right. Post the content of that pop-up dialog. Let's see what IP addresses and subnets are listed on the Pass List currently running on that interface.

                        1 Reply Last reply Reply Quote 0
                        • E
                          ezvink @johnpoz
                          last edited by

                          I rebuilt the VM and this is what the passlist looks like.
                          Yes, it seems that's where the problem is, indeed, the attacker's IP is included in the passlist.
                          IP 172.16.120.0/24 is the IP of the attacker
                          IP 192.168.55.0/24 is the IP of the webserver
                          WhatsApp Image 2022-09-21 at 2.34.33 PM.jpeg

                          1 Reply Last reply Reply Quote 0
                          • E
                            ezvink
                            last edited by

                            Then, how is the solution, sir? If I give a network attacker VM that does not originate from Pfsense, attackers cannot access webserver

                            bmeeksB 1 Reply Last reply Reply Quote 0
                            • Cool_CoronaC
                              Cool_Corona
                              last edited by

                              Isnt this debate intended to pinpoint how to add an attacking IP (outside source) to a blocklist?

                              So the list gets bigger and bigger every day, so they eventually run out of IP4 and then the admin can see who and whats on the list?

                              E 1 Reply Last reply Reply Quote 0
                              • E
                                ezvink @Cool_Corona
                                last edited by

                                @cool_corona
                                Yes, that's right, sir, but I haven't found a way to get the attacker's IP (outside source) to connect to the webserver

                                Cool_CoronaC 1 Reply Last reply Reply Quote 0
                                • Cool_CoronaC
                                  Cool_Corona @ezvink
                                  last edited by

                                  @ezvink why would you do that?

                                  E 1 Reply Last reply Reply Quote 0
                                  • E
                                    ezvink @Cool_Corona
                                    last edited by

                                    @cool_corona said in how to get IP Attacker into the blocklist:

                                    why would you do that?

                                    this is part of my final project sir

                                    1 Reply Last reply Reply Quote 0
                                    • E
                                      ezvink
                                      last edited by

                                      what with firewall->port forward settings will this work sir?
                                      9b8c8031-b889-46ca-b4c7-99034660cfca-image.png

                                      Cool_CoronaC 1 Reply Last reply Reply Quote 0
                                      • Cool_CoronaC
                                        Cool_Corona @ezvink
                                        last edited by

                                        @ezvink No.

                                        Choose WAN as interface and set NAT to Use System Default.

                                        E 1 Reply Last reply Reply Quote 0
                                        • E
                                          ezvink @Cool_Corona
                                          last edited by

                                          @cool_corona
                                          ok sir, now for the ip redirect
                                          what is it, sir? Attacker's IP? or which IP?

                                          johnpozJ 1 Reply Last reply Reply Quote 0
                                          • johnpozJ
                                            johnpoz LAYER 8 Global Moderator @ezvink
                                            last edited by

                                            @ezvink said in how to get IP Attacker into the blocklist:

                                            what is it, sir? Attacker's IP? or which IP?

                                            So think about that for like .2 seconds..

                                            attacker ---> wan (pfsense) lan ---> server

                                            Where do you think you should send that traffic hitting your wan, if you want it to get to the server?

                                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                                            If you get confused: Listen to the Music Play
                                            Please don't Chat/PM me for help, unless mod related
                                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.